Professional Documents
Culture Documents
Techical Seminar DS
Techical Seminar DS
Techical Seminar DS
On
DIGITAL SIGNATURE
By
(16261A0505)
MENTORED BY
DR. A. NAGESH
(PROFESSOR)
BACHELOR OF TECHNOLOGY
TECHNOLOGY
AUGUST 2019
MAHATMA GANDHI INSTITUTE OF TECHNOLOGY
(Estd in 1997 by Chaitanya Bharathi Educational Society) (Affiliated
to JNTU, Hyderabad; Accredited by NBA, AICTE-New Delhi)
Kokapet(village & gram panchayat), Rajendra Nagar (Mandal), Ranga
Reddy(Dist.), Chaitanya Bharathi P.O., Hyderabad-500 075.
CERTIFICATE
Seminar Coordinators
Head of the Department
Mrs. M Mamatha
(Assistant Professor)
A. Arun
Digital signatures are based on 3. The document and the signed hash are
mathematical algorithms. These require the transmitted.
signature holder to have two keys (one
private and the public) for signing and 4. The recipient produces a one-way hash of
verification . A verifiable trustworthy entity the document.
called certification authority creates and
distributes signatures. A digital signature is a 5. Using the digital signature algorithm, the
cryptographic means through which many of recipient decrypts the signed hash with the
these may be verified. The digital signature sender's public key. If the signed hash
of a document is a piece of information based matches the recipient's hash, the signature is
on both the document and the signer’s valid and the document is intact.
private key. It is typically created through the
use of a hash function and a private signing
function (encrypting with the signer’s 4. REQUIREMENTS:
private key).
The Basic Requirements of the Digital
Digital Signatures and hand – written Signature are following:-
signatures both rely on the fact that it is very
hard to find two people with the same
signature.
• PRIVATE KEY 4.3 Digital Signature Certificate:
• PUBLIC KEY
• DIGITAL SIGNATURE who are intended to receive the signed
CERTIFICATE messages from the subscriber. But in case of
any dispute between the two sides, there
must be some entity with the receiver which
will allow the receiver of the message to
prove that the message was indeed sent by
the subscriber of the key pair.
The problems associated with direct digital Creating a digital signature requires the
signatures can be addressed by using an signer to use his private key. This alters the
arbiter. As with direct signature schemes, signer that he is consummating a transaction
there are a variety of arbitrated signature with legal consequences, decreasing the
schemes. In general terms, these all operate chances of litigation later on.
as follows: every signed message from
sender X to the receiver Y goes first to the 7.4 Integrity :
arbiter A, who subjects the message and its
signature to the number of tests to check its Digital signature creation and verification
origin and content. processes provide a high level of assurance
that the digital signature is that of the signer.
The message is then dated and sends to Y Compared to tedious and labor intensive
with an indication that it has been verified to paper methods, such as checking signature
the satisfaction of the arbiter. With the cards, digital signatures yield a high degree
presence of arbiter A, there are no chances of of assurance without adding resources for
a sender X to disowning the message, as is processing
the case with the direct digital signatures.
The arbiter plays a crucial role in arbitrated
digital signatures and all parties must have a 8.DIGITAL SIGNATURE
great deal of trust that the arbitration ALGORITHM:
mechanism working properly. The use of a
trusted system might satisfy this
requirement. The digital signature algorithm specifies the
procedure to generate and verify the digital
signature.
7. PURPOSE OF DIGITAL • Digital Signature Generation
• Digital Signature Verification
SIGNATURE:
If v does not equal r', then the message may • Message integrity, by minimizing the risk
have been modified, the message may have of undetected message tampering and
been incorrectly signed by the signatory, or forgery, and of false claims that a message
the message may have been signed by an was altered after it was sent.
impostor. The message should be considered
invalid 12.APPLICATIONS OF DIGITAL
SIGNATURE:
11.CHALLENGES AND
OPPURTUNITIES: The scope of Digital Signature is not just
limited to exchange of messages. The
The prospect of fully implementing digital handwritten signature is commonly used in
signatures in general commerce presents all kinds of applications to prove the identity
both benefits and costs. of the signer.
The costs consist mainly of: In the same way, a digital signature can be
used for all kinds of electronic records.
Any field in which the integrity and validity So before generating the message digest, the
of the data is crucial, can make use of a message should be encrypted. Then the
Digital Signature. Here we discuss a few of digital signature is generated and attached to
these applications. the message. At the receiving end after
verification of signature, the message is
12.1.Electronic Mail. decrypted to recover the original message.
14. CONCLUSION:
Digital signatures are difficult to
understand. Digital signatures will be
championed by many players that the public
distrusts, including national security
agencies, law enforcement agencies, and
consumer marketing companies. Digital
signatures will inevitably be associated with
cards. Digital signatures will inevitably be
associated with biometric identifiers. As a
result, it appears that digital technology is
rapidly becoming pervasive, the public not
find this comforting. They will demand
explicit privacy protections, far more
substantial than the weak and patchy regime
that is presently in place. The protections are
also quite inadequate, though promising in
some respects. Successful implementation of
digital signatures will require far more
attention to privacy issues by policymakers
and business interests.
15.ACKNOWLEDGMENT:
16.REFERENCES:
1. www.wikipedia.com
2. www.google.com
3. www.tutorialpoint.com